GCN Tech Blog

By GCN Staff

Blog archive

Return of the Chinese menace

Did malicious Chinese hackers break into Congressional computers to figure out what lawmakers knew of China's human rights violations? Two House members, Rep. Christopher H. Smith of (R-N.J.) and Rep. Frank R. Wolf (R-Va.) have made this charge, though Chinese officials deny the allegations.

We've covered the Chinese threat before, especially as it pertains to Defense networks.

As always, one thing we'd like to see more of in these charges is stronger evidence. After all, any script kiddie with port scanning software can "attack" a public-facing military network. And someone anywhere in the world can hijack a unsecured computer on the network to launch their own evil-doings. Names please, not IP numbers.

Posted by Joab Jackson on Jun 12, 2008 at 9:39 AM


Featured

  • Defense
    concept image of radio communication (DARPA)

    What to look for in DOD's coming spectrum strategy

    Interoperability, integration and JADC2 are likely to figure into an updated electromagnetic spectrum strategy expected soon from the Department of Defense.

  • FCW Perspectives
    data funnel (anttoniart/Shutterstock.com)

    Real-world data management

    The pandemic has put new demands on data teams, but old obstacles are still hindering agency efforts.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.